CS468 Midterm 1

0.0(0)
studied byStudied by 4 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/125

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:34 AM on 9/29/23
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

126 Terms

1
New cards

Confidentiality Definition:

A. information disclosed only to those intended.

B. information cannot be modified without being detected.

C. ensure that communicating parties are who they say they are.

D. ensure that authenticated users are given access only to appropriate information.

E. ensure that you get the resources you want

A. information disclosed only to those intended.

2
New cards

Authentication Definition:

A. information disclosed only to those intended.

B. information cannot be modified without being detected.

C. ensure that communicating parties are who they say they are.

D. ensure that authenticated users are given access only to appropriate information.

E. ensure that you get the resources you want

C. ensure that communicating parties are who they say they are.

3
New cards

Integrity Definition:

A. information disclosed only to those intended.

B. information cannot be modified without being detected.

C. ensure that communicating parties are who they say they are.

D. ensure that authenticated users are given access only to appropriate information.

E. ensure that you get the resources you want

B. information cannot be modified without being detected.

4
New cards

Access Control Definition:

A. information disclosed only to those intended.

B. information cannot be modified without being detected.

C. ensure that communicating parties are who they say they are.

D. ensure that authenticated users are given access only to appropriate information.

E. ensure that you get the resources you want

D. ensure that authenticated users are given access only to appropriate information.

5
New cards

Availability Definition:

A. information disclosed only to those intended.

B. information cannot be modified without being detected.

C. ensure that communicating parties are who they say they are.

D. ensure that authenticated users are given access only to appropriate information.

E. ensure that you get the resources you want

E. ensure that you get the resources you want

6
New cards

Vulnerability Definition:

the web site relies on JavaScript to be executed on the client browser for access control

7
New cards

Exploit Definition:

An exploit is the act of exercising a vulnerability

8
New cards

Also used to refer to an actual program, binary or script that automates an attack

Exploit

9
New cards

Attack Tree

A branching, hierarchical data structure that represents a set of potential techniques for exploiting security vulnerabilities

10
New cards

Cryptography algorithms

Secret key (e.g., AES), Public key (e.g., RSA), and Message digest (e.g., SHA-3)

11
New cards

Secret key

(e.g., AES)

12
New cards

Public Key

(e.g., RSA)

13
New cards

Message digest

(e.g., SHA-3)

14
New cards

Plaintext

original message

15
New cards

ciphertext

coded message

16
New cards

cipher

algorithm for transforming plaintext to ciphertext

17
New cards

key

info used in cipher

18
New cards

encipher (encrypt)

converting plaintext to ciphertext

19
New cards

decipher (decrypt)

recovering ciphertext from plaintext

20
New cards

cryptography

study of encryption principles/methods

21
New cards

cryptanalysis (codebreaking)

study of principles/ methods of deciphering ciphertext without knowing key

22
New cards

cryptology

field of both cryptography and cryptanalysis

23
New cards

Passive attack

This means that you eavesdrop on transmissions

You may accidentally release message contents - Outsider learns content of transmission

24
New cards

Traffic analysis

By monitoring frequency and length of messages, even encrypted, nature of communication may be guessed

25
New cards

Masquerade

Pretending to be a different entity

26
New cards

Replay Attack

A type of network attack where an attacker

captures network traffic and stores it for

retransmission at a later time to gain

unauthorized access to a network.

27
New cards

Modify messages Attack

Modifies Message for malicious reasons, possibly to gain trust of recipient or cause distrust between sender and recipient

28
New cards

The type of encryption operations used

substitution / transposition / product

29
New cards

The number of keys used

single-key or private / two-key or public

30
New cards

The way in which plaintext is processed

block / stream

31
New cards

Brute Force Search

It is always possible to simply try every key

32
New cards

DES

56

33
New cards

AES

128

34
New cards

Triple DES

168

35
New cards

AES

192

36
New cards

AES 2

256

37
New cards

Monoalphabetic

26 character permutation

38
New cards

ciphertext only

only know algorithm & ciphertext, is statistical, know or can identify plaintext

39
New cards

known plaintext

know/suspect plaintext & ciphertext

40
New cards

chosen plaintext

select plaintext and obtain ciphertext

41
New cards

chosen ciphertext

select ciphertext and obtain plaintext

42
New cards

unconditional security

no matter how much computer power or time is available, the cipher cannot be broken since the ciphertext provides insufficient information to uniquely determine the corresponding plaintext

43
New cards

computational security

given limited computing resources the cipher cannot be broken

44
New cards

Symmetric Key Requirements

- a strong encryption algorithm Y = EK(X)

- a secret key known only to sender / receiver X = DK(Y)

Must assume encryption algorithm is known o But implies a secure channel to distribute key

45
New cards

Caesar Cipher

5X5 matrix of letters based on a keyword o Fill in letters of keyword (without duplicates)

46
New cards

Polyalphabetic substitution ciphers

use multiple alphabets in the same message to hinder decryption efforts

ex- Vigenere cipher -> uses a single enc/dec chart and requires a key

47
New cards

Vigenère Cipher

a method of encrypting text by applying a series of Caesar ciphers based on the letters of a keyword.

48
New cards

Autokey Cipher

a key as long as the message

49
New cards

One-Time Pad

Unbreakable since ciphertext bears no statistical relationship to the plaintext

50
New cards

Transposition Ciphers

Hide the message by rearranging the letter order without altering the actual letters used

51
New cards

Rail Fence cipher

Write message letters out diagonally over a number of rows

52
New cards

Row Transposition Ciphers

Write letters of message out in rows over a specified number of columns

Then reorder the columns according to some key before reading off the rows

53
New cards

Substitution ciphers Where letters of plaintext are replaced by other letters or by numbers or symbols

Where letters of plaintext are replaced by other letters or by numbers or symbols

54
New cards

Transposition or permutation ciphers

- Hide the message by rearranging the letter order

- But you don't alter the actual letters used

55
New cards

Product Ciphers

A combination of transposition and/or substitution ciphers

56
New cards

Block Cipher

-Maximum number of encryption mappings

-2n possible different plaintext blocks

-Each must produce a unique cipher block

-2n ! (factorial) different transformations

57
New cards

Claude Shannon

Substitution-Permutation Ciphers

58
New cards

Diffusion

Dissipates statistical structure of plaintext over bulk of ciphertext

59
New cards

Confusion

makes relationship between ciphertext and key as complex as possible

60
New cards

Problem with Block ciphers

-would need table of 264 entries for a 64-bit block n x 2n key size

- Create security from smaller building blocks using idea of a product cipher

61
New cards

Actual Block Ciphers

May have invertible, non-invertible and self-invertible functions

62
New cards

Shift Box

moves inputs over by some n bits(may be circular)

63
New cards

Swap box

swaps two or more blocks of bits

64
New cards

Compression P-box

Not all inputs map to an output

65
New cards

Expansion P-Box:

Some inputs map to multiple outputs

66
New cards

Compression and Expansion P-Boxes are ____.

-not invertible

-Compression boxes lose information

-Cannot invert expansion box if two different outputs would map to the same input

-Used primarily in key generation

67
New cards

Feistel cipher

-Based on concept of invertible product cipher

-Has non-invertible parts!

-Encryption and decryption are inverses of each other (?)

68
New cards

Feistel Cipher Design Elements

-Block size

-Key size

- Number of rounds

- Subkey generation algorithm

- Round function

- Fast software en/decryption

- Ease of analysis

69
New cards

Data Encryption Standard (DES)

encrypts 64-bit data using 56-bit key (16 rounds)

70
New cards

Strong Avalanche in DES

A change of one input or key bit results in changing approximately half output bits

71
New cards

Strength of DES

key size, 56-bit keys have 256 = 7.2 x 1016 values

72
New cards

DES Attacks

Statistical attacks

-differential cryptanalysis: compare related encryptions

-linear cryptanalysis: use linear approximations

There are also timing attacks

-They use the fact that calculations can take varying times depending on the value of the inputs to it

73
New cards

Differential cryptanalysis compares ____ related pairs of encryptions

two

74
New cards

AES Requirements

Private key symmetric block cipher

- 128-bit data, 128/192/256-bit keys

- Stronger & faster than Triple-DES

- Active life of 20-30 years (+ archival use)

- Provide full specification & design details

- Both C & Java implementations

- NIST have released all submissions & unclassified analyses

75
New cards

Modular arithmetic is when you do ____.

addition and multiplication and then modulo reduce answer

76
New cards

If commutative

Forms an abelian group

-Integers using addition and real numbers using multiplication form an infinite abelian group

77
New cards

Cyclic Group

Define exponentiation as repeated application of operator

A group is cyclic if every element is a power of some fixed element ie b = a^k for some a and every b in group

- a is said to be a generator of the group

78
New cards

DES key problems

-Theoretical attacks that can break it

-Demonstrated exhaustive key search attacks

79
New cards

"Meet-in-the-middle" attack

known (C,P) pairs -Since X = EK1(P) = DK2(C)

-Attack by encrypting P with all keys and store

-Then decrypt C with all keys and match X value

80
New cards

Ring

A set of elements with two operations (typically called "addition" and "multiplication") that form:

-if multiplication operation is commutative, it forms a commutative ring

-if multiplication operation has an identity and no zero divisors, it forms an integral domain

-The set of all n-square matrices over real numbers forms a ring

81
New cards

A field is ____.

any set of elements that satisfies the field axioms for both addition and multiplication

82
New cards

Galois Fields

It can be shown show number of elements in a finite field must be a power of a prime p^n

83
New cards

Modulo reduction done by

repeatedly substituting highest power with remainder of irreducible poly (also shift & XOR)

84
New cards

Rijndael cipher

Data block of 4 columns of 4 bytes is state

- Key is expanded to array of words

- Has 9/11/13 rounds in which state undergoes:

- byte substitution (1 S-box used on every byte)

- shift rows (permute bytes between groups/columns)

- mix columns (subs using matrix multipy of groups)

- add round key (XOR state with key material)

- view as alternating XOR key & scramble data bytes

- Initial XOR key material & incomplete last round

-Fast XOR & table lookup implementation

85
New cards

Key Expansion Rationale

-Designed to resist known attacks

-Design criteria included

- knowing part key insufficient to find many more

- invertible transformation

- fast on wide range of CPU's

- use round constants to break symmetry

- diffuse key bits into round keys

- enough non-linearity to hinder analysis - simplicity of description

86
New cards

AES decryption

AES decryption cipher is not identical to the encryption cipher -The sequence of transformations differs although the form of the key schedules is the same

-Has the disadvantage that two separate software or firmware modules are needed for applications that require both encryption and decryption

87
New cards

(AES)Only _______ makes use of the key

Add round key.

-All other stages reversible without knowledge of key

-The other three stages add diffusion, confusion, and nonlinearity

88
New cards

Electronic Codebook Book (ECB)

-Message is broken into independent blocks which are encrypted

-Each block is a value which is substituted, like a codebook, hence name

-Each block is encoded independently of the other blocks

89
New cards

Limitations of ECB

Weakness is due to the encrypted message blocks being independent

90
New cards

Cipher Block Chaining (CBC)

Message is broken into blocks

-Linked together in encryption operation

-Each previous cipher blocks is chained with current plaintext block, hence name

91
New cards

Message Padding

At end of message must handle a possible last short block

92
New cards

Limitations of CBC

- A ciphertext block depends on all blocks before it

- Any change to a block affects all following ciphertext blocks

93
New cards

Cipher FeedBack (CFB)

Message is treated as a stream of bits

-Added to the output of the block cipher

- Essentially uses the block cipher as a pseudo-random number generator

-Result is feed back for next stage (hence name) - Uses a b-bit shift register

94
New cards

Limitations of CFB

Limitation is need to stall while doing block encryption after every n-bits

Errors may propagate for several blocks after the error

95
New cards

Output FeedBack (OFB)

-Message is treated as a stream of bits

-Output of cipher is added to message

-Output is then feed back o Feedback is independent of message

96
New cards

Advantages and Limitations of OFB

-Bit errors do not propagate

-More vulnerable to message stream modification

-Sender and receiver must remain in sync

97
New cards

Counter (CTR)

-Similar to OFB but encrypts counter value rather than any feedback value

-You must have a different counter value for every plaintext block (never reused)

98
New cards

Advantages and Limitations of CTR

Efficiency

- can do parallel encryptions in h/w or s/w

- can preprocess in advance of need

- good for bursty high speed links

o Random access to encrypted data blocks

o Provable security (good as other modes)

o User must ensure that key/counter values are never reused

99
New cards

XTS-AES Mode for Block-Oriented Storage Devices

Standard describes a method of encryption for data stored in sector-based devices where the threat model includes possible access to stored data by the adversary

100
New cards

Tweakable Block Ciphers

General structure:

• Has three inputs: plaintext, symmetric text, and tweak

• Tweak need not be kept secret

• Purpose is to provide variability

Produces ciphertext